Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google chrome 2.0.172.8 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-0656
WebKit before r51295, as used in Google Chrome prior to 4.0.249.78, presents a directory-listing page in response to an XMLHttpRequest for a file:/// URL that corresponds to a directory, which allows malicious users to obtain sensitive information or possibly have unspecified oth...
Apple Webkit
Google Chrome
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
NA
CVE-2010-0658
Multiple integer overflows in Skia, as used in Google Chrome prior to 4.0.249.78, allow remote malicious users to execute arbitrary code in the Chrome sandbox or cause a denial of service (memory corruption and application crash) via vectors involving CANVAS elements.
Google Chrome
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
Google Chrome 0.4.154.33
NA
CVE-2010-0659
The image decoder in WebKit before r52833, as used in Google Chrome prior to 4.0.249.78, does not properly handle a failure of memory allocation, which allows remote malicious users to execute arbitrary code in the Chrome sandbox via a malformed GIF file that specifies a large si...
Apple Webkit
Google Chrome
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
NA
CVE-2010-0661
WebCore/bindings/v8/custom/V8DOMWindowCustom.cpp in WebKit before r52401, as used in Google Chrome prior to 4.0.249.78, allows remote malicious users to bypass the Same Origin Policy via vectors involving the window.open method.
Apple Webkit 52400
Google Chrome
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
NA
CVE-2010-0556
browser/login/login_prompt.cc in Google Chrome prior to 4.0.249.89 populates an authentication dialog with credentials that were stored by Password Manager for a different web site, which allows user-assisted remote HTTP servers to obtain sensitive information via a URL that requ...
Google Chrome
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
Google Chrome 0.4.154.33
NA
CVE-2010-0315
WebKit before r53607, as used in Google Chrome prior to 4.0.249.89, allows remote malicious users to discover a redirect's target URL, for the session of a specific user of a web site, by placing the site's URL in the HREF attribute of a stylesheet LINK element, and the...
Google Chrome
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
Google Chrome 0.4.154.33
1 EDB exploit
NA
CVE-2010-0643
Google Chrome prior to 4.0.249.89 attempts to make direct connections to web sites when all configured proxy servers are unavailable, which allows remote HTTP servers to obtain potentially sensitive information about the identity of a client user via standard HTTP logging, as dem...
Google Chrome
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
Google Chrome 0.4.154.33
NA
CVE-2010-0644
Google Chrome prior to 4.0.249.89, when a SOCKS 5 proxy server is configured, sends DNS queries directly, which allows remote DNS servers to obtain potentially sensitive information about the identity of a client user via request logging, as demonstrated by a proxy server that wa...
Google Chrome
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
Google Chrome 0.4.154.33
NA
CVE-2010-0645
Multiple integer overflows in factory.cc in Google V8 before r3560, as used in Google Chrome prior to 4.0.249.89, allow remote malicious users to execute arbitrary code in the Chrome sandbox via crafted use of JavaScript arrays.
Google Chrome
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
Google Chrome 0.4.154.33
NA
CVE-2010-0649
Integer overflow in the CrossCallParamsEx::CreateFromBuffer function in sandbox/src/crosscall_server.cc in Google Chrome prior to 4.0.249.89 allows malicious users to leverage renderer access to cause a denial of service (heap memory corruption) or possibly have unspecified other...
Google Chrome
Google Chrome 0.2.149.27
Google Chrome 0.2.149.29
Google Chrome 0.2.149.30
Google Chrome 0.2.152.1
Google Chrome 0.2.153.1
Google Chrome 0.3.154.0
Google Chrome 0.3.154.3
Google Chrome 0.4.154.18
Google Chrome 0.4.154.22
Google Chrome 0.4.154.31
Google Chrome 0.4.154.33
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-54130
firmware
CVE-2024-42327
CVE-2024-42448
CVE-2024-54126
CVE-2024-53846
CVE-2024-38920
XPath injection
HTML injection
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »